droid-native
Next Generation Android x86 Desktop - Anbox, Lineage, WayDroid, BlissOS, Dock-Droid (by sickcodes)
checksec.sh
Checksec.sh (by slimm609)
droid-native | checksec.sh | |
---|---|---|
1 | 3 | |
122 | 1,941 | |
- | - | |
3.2 | 6.7 | |
over 2 years ago | 6 days ago | |
Shell | Roff | |
GNU General Public License v3.0 only | GNU General Public License v3.0 or later |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
droid-native
Posts with mentions or reviews of droid-native.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-09-17.
-
Which kernel package do you use? Explain in the comments, why.
Anbox is now proprietary, Anbox-cloud.io, check out WayDroid and to install the kernel properly use the first part of: https://github.com/sickcodes/droid-native
checksec.sh
Posts with mentions or reviews of checksec.sh.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-11-11.
-
Need Help with Int3 Breakpoint - Segmentation Fault Error and Python 2 to Python 3 Conversion
probably non executable stack. can you run https://github.com/slimm609/checksec.sh on the binary?
-
Hardening ELF Binaries Using Relocation Read-Only (Relro)
Also, one can use checksec to confirm that the protections are actually in place. https://github.com/slimm609/checksec.sh
I happened to be looking at this for Go binaries last night and it seems that -buildmode=pie gets you part of the way there. Was trying to see if full relro was possible with CGO_ENABLED=0 but it seems only partial was achievable in the few hours I spent.
-
Which kernel package do you use? Explain in the comments, why.
I also want to point out the checksec script for your confirming security on your userspace binaries - https://github.com/slimm609/checksec.sh (look for violations marked in red)
What are some alternatives?
When comparing droid-native and checksec.sh you can also consider the following projects:
linux-hardened - Minimal supplement to upstream Kernel Self Protection Project changes. Features already provided by SELinux + Yama and archs other than multiarch arm64 / x86_64 aren't in scope. Only tags have stable history. Shared IRC channel with KSPP: irc.libera.chat #linux-hardening
svntogit-packages - Automatic import of svn 'packages' repo (read-only mirror)
kernel-hardening-checker - A tool for checking the security hardening options of the Linux kernel